How Can Malicious Code Be Embedded And Hidden